/openbsd-src/regress/lib/libskey/ |
H A D | skeytest.c | 41 char *algo, *zero, *one, *nine; member 89 for(rr = rp->res; rr->algo; rr++) { in main() 90 if (skey_set_algorithm(rr->algo) == NULL) { in main() 93 i, rr->algo); in main() 97 if (strcmp(skey_get_algorithm(), rr->algo) != 0) { in main() 100 i, rr->algo); in main() 110 i, rr->algo, rr->zero, prn); in main() 119 i, rr->algo, rr->one, prn); in main() 129 i, rr->algo, rr->nine, prn); in main()
|
/openbsd-src/usr.sbin/unbound/validator/ |
H A D | val_secalgo.c | 131 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, in secalgo_nsec3_hash() argument 134 switch(algo) { in secalgo_nsec3_hash() 226 * @param algo: DS digest algo. 230 ds_digest_size_supported(int algo) in ds_digest_size_supported() argument 232 switch(algo) { in ds_digest_size_supported() 278 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, in secalgo_ds_digest() argument 281 switch(algo) { in secalgo_ds_digest() 323 algo); in secalgo_ds_digest() 540 * @param algo 545 setup_key_digest(int algo,EVP_PKEY ** evp_key,const EVP_MD ** digest_type,unsigned char * key,size_t keylen) setup_key_digest() argument 732 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument 870 secalgo_nsec3_hash(int algo,unsigned char * buf,size_t len,unsigned char * res) secalgo_nsec3_hash() argument 947 ds_digest_size_supported(int algo) ds_digest_size_supported() argument 971 secalgo_ds_digest(int algo,unsigned char * buf,size_t len,unsigned char * res) secalgo_ds_digest() argument 1059 nss_buf2ecdsa(unsigned char * key,size_t len,int algo) nss_buf2ecdsa() argument 1235 nss_setup_key_digest(int algo,SECKEYPublicKey ** pubkey,HASH_HashType * htype,unsigned char * key,size_t keylen,unsigned char ** prefix,size_t * prefixlen) nss_setup_key_digest() argument 1375 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument 1500 _digest_nettle(int algo,uint8_t * buf,size_t len,unsigned char * res) _digest_nettle() argument 1556 secalgo_nsec3_hash(int algo,unsigned char * buf,size_t len,unsigned char * res) secalgo_nsec3_hash() argument 1656 ds_digest_size_supported(int algo) ds_digest_size_supported() argument 1683 secalgo_ds_digest(int algo,unsigned char * buf,size_t len,unsigned char * res) secalgo_ds_digest() argument 2023 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument [all...] |
H A D | val_kentry.c | 62 if(kd->algo) in key_entry_sizefunc() 63 s += strlen((char*)kd->algo)+1; in key_entry_sizefunc() 97 free(kd->algo); in key_entry_deldatafunc() 143 if(d->algo) { in key_entry_copy_toregion() 144 newd->algo = (uint8_t*)regional_strdup(region, in key_entry_copy_toregion() 145 (char*)d->algo); in key_entry_copy_toregion() 146 if(!newd->algo) in key_entry_copy_toregion() 205 if(d->algo) { in key_entry_copy() 206 newd->algo = (uint8_t*)strdup((char*)d->algo); in key_entry_copy() 207 if(!newd->algo) { in key_entry_copy() [all …]
|
H A D | val_secalgo.h | 60 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, 118 size_t ds_digest_size_supported(int algo); 127 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len, 146 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo,
|
H A D | val_sigcrypt.c | 127 * @return algo or 0 if malformed rrsig. 340 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not " in ds_digest_match_dnskey() 353 return 0; /* digest algo failed */ in ds_digest_match_dnskey() 439 uint8_t algo; in algo_needs_init_dnskey_add() local 444 algo = (uint8_t)dnskey_get_algo(dnskey, i); in algo_needs_init_dnskey_add() 445 if(!dnskey_algo_id_is_supported((int)algo)) in algo_needs_init_dnskey_add() 447 if(n->needs[algo] == 0) { in algo_needs_init_dnskey_add() 448 n->needs[algo] = 1; in algo_needs_init_dnskey_add() 449 sigalg[total] = algo; in algo_needs_init_dnskey_add() 459 uint8_t algo; in algo_needs_init_list() local 475 uint8_t algo; algo_needs_init_ds() local 497 algo_needs_set_secure(struct algo_needs * n,uint8_t algo) algo_needs_set_secure() argument 508 algo_needs_set_bogus(struct algo_needs * n,uint8_t algo) algo_needs_set_bogus() argument 566 int algo = rrset_get_sig_algo(rrset, sig_idx); dnskeyset_verify_rrset_sig() local 715 int algo = dnskey_get_algo(dnskey, dnskey_idx); dnskey_verify_rrset() local [all...] |
H A D | val_nsec3.c | 223 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) in nsec3_get_params() argument 229 *algo = nsec3_get_algo(rrset, r); in nsec3_get_params() 364 /* skip unknown flags, algo */ in filter_next() 393 /** see if at least one RR is known (flags, algo) */ 408 * (skips the unknown flag and unknown algo NSEC3s). 435 /* skip unknown flags, algo */ in filter_init() 560 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, in nsec3_get_hashed() argument 570 hash_len = nsec3_hash_algo_size_supported(algo); in nsec3_get_hashed() 572 log_err("nsec3 hash of unknown algo %d", algo); in nsec3_get_hashed() 598 int algo = nsec3_get_algo(c->nsec3, c->rr); nsec3_calc_hash() local [all...] |
H A D | val_sigcrypt.h | 76 * Initialize algo needs structure, set algos from rrset as needed. 86 * Initialize algo needs structure from a signalled algo list. 93 * Initialize algo needs structure, set algos from rrset as needed. 96 * @param fav_ds_algo: filter to use only this DS algo. 106 * @param algo: the algorithm processed to be secure. 109 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo); 115 * @param algo: the algorithm processed to be bogus. 117 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo); 127 * See which algo i [all...] |
H A D | val_nsec3.h | 353 * @param algo: nsec3 hash algo. 357 * @return 0 if bad formatted, unknown nsec3 hash algo, or unknown flags set. 360 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen); 367 * @param algo: algo to use, must be known. 376 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
|
/openbsd-src/sbin/unwind/libunbound/validator/ |
H A D | val_secalgo.c | 131 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, in secalgo_nsec3_hash() argument 134 switch(algo) { in secalgo_nsec3_hash() 226 * @param algo: DS digest algo. 230 ds_digest_size_supported(int algo) in ds_digest_size_supported() argument 232 switch(algo) { in ds_digest_size_supported() 278 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, in secalgo_ds_digest() argument 281 switch(algo) { in secalgo_ds_digest() 323 algo); in secalgo_ds_digest() 540 * @param algo 545 setup_key_digest(int algo,EVP_PKEY ** evp_key,const EVP_MD ** digest_type,unsigned char * key,size_t keylen) setup_key_digest() argument 732 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument 870 secalgo_nsec3_hash(int algo,unsigned char * buf,size_t len,unsigned char * res) secalgo_nsec3_hash() argument 947 ds_digest_size_supported(int algo) ds_digest_size_supported() argument 971 secalgo_ds_digest(int algo,unsigned char * buf,size_t len,unsigned char * res) secalgo_ds_digest() argument 1059 nss_buf2ecdsa(unsigned char * key,size_t len,int algo) nss_buf2ecdsa() argument 1235 nss_setup_key_digest(int algo,SECKEYPublicKey ** pubkey,HASH_HashType * htype,unsigned char * key,size_t keylen,unsigned char ** prefix,size_t * prefixlen) nss_setup_key_digest() argument 1375 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument 1500 _digest_nettle(int algo,uint8_t * buf,size_t len,unsigned char * res) _digest_nettle() argument 1556 secalgo_nsec3_hash(int algo,unsigned char * buf,size_t len,unsigned char * res) secalgo_nsec3_hash() argument 1656 ds_digest_size_supported(int algo) ds_digest_size_supported() argument 1683 secalgo_ds_digest(int algo,unsigned char * buf,size_t len,unsigned char * res) secalgo_ds_digest() argument 2023 verify_canonrrset(sldns_buffer * buf,int algo,unsigned char * sigblock,unsigned int sigblock_len,unsigned char * key,unsigned int keylen,char ** reason) verify_canonrrset() argument [all...] |
H A D | val_kentry.c | 62 if(kd->algo) in key_entry_sizefunc() 63 s += strlen((char*)kd->algo)+1; in key_entry_sizefunc() 97 free(kd->algo); in key_entry_deldatafunc() 143 if(d->algo) { in key_entry_copy_toregion() 144 newd->algo = (uint8_t*)regional_strdup(region, in key_entry_copy_toregion() 145 (char*)d->algo); in key_entry_copy_toregion() 146 if(!newd->algo) in key_entry_copy_toregion() 205 if(d->algo) { in key_entry_copy() 206 newd->algo = (uint8_t*)strdup((char*)d->algo); in key_entry_copy() 207 if(!newd->algo) { in key_entry_copy() [all …]
|
H A D | val_secalgo.h | 60 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, 118 size_t ds_digest_size_supported(int algo); 127 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len, 146 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo,
|
H A D | val_sigcrypt.c | 127 * @return algo or 0 if malformed rrsig. 340 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not " in ds_digest_match_dnskey() 353 return 0; /* digest algo failed */ in ds_digest_match_dnskey() 439 uint8_t algo; in algo_needs_init_dnskey_add() local 444 algo = (uint8_t)dnskey_get_algo(dnskey, i); in algo_needs_init_dnskey_add() 445 if(!dnskey_algo_id_is_supported((int)algo)) in algo_needs_init_dnskey_add() 447 if(n->needs[algo] == 0) { in algo_needs_init_dnskey_add() 448 n->needs[algo] = 1; in algo_needs_init_dnskey_add() 449 sigalg[total] = algo; in algo_needs_init_dnskey_add() 459 uint8_t algo; in algo_needs_init_list() local 475 uint8_t algo; algo_needs_init_ds() local 497 algo_needs_set_secure(struct algo_needs * n,uint8_t algo) algo_needs_set_secure() argument 508 algo_needs_set_bogus(struct algo_needs * n,uint8_t algo) algo_needs_set_bogus() argument 566 int algo = rrset_get_sig_algo(rrset, sig_idx); dnskeyset_verify_rrset_sig() local 715 int algo = dnskey_get_algo(dnskey, dnskey_idx); dnskey_verify_rrset() local [all...] |
H A D | val_nsec3.c | 223 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) in nsec3_get_params() argument 229 *algo = nsec3_get_algo(rrset, r); in nsec3_get_params() 364 /* skip unknown flags, algo */ in filter_next() 393 /** see if at least one RR is known (flags, algo) */ 408 * (skips the unknown flag and unknown algo NSEC3s). 435 /* skip unknown flags, algo */ in filter_init() 560 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, in nsec3_get_hashed() argument 570 hash_len = nsec3_hash_algo_size_supported(algo); in nsec3_get_hashed() 572 log_err("nsec3 hash of unknown algo %d", algo); in nsec3_get_hashed() 598 int algo = nsec3_get_algo(c->nsec3, c->rr); nsec3_calc_hash() local [all...] |
H A D | val_sigcrypt.h | 76 * Initialize algo needs structure, set algos from rrset as needed. 86 * Initialize algo needs structure from a signalled algo list. 93 * Initialize algo needs structure, set algos from rrset as needed. 96 * @param fav_ds_algo: filter to use only this DS algo. 106 * @param algo: the algorithm processed to be secure. 109 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo); 115 * @param algo: the algorithm processed to be bogus. 117 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo); 127 * See which algo i [all...] |
H A D | val_nsec3.h | 353 * @param algo: nsec3 hash algo. 357 * @return 0 if bad formatted, unknown nsec3 hash algo, or unknown flags set. 360 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen); 367 * @param algo: algo to use, must be known. 376 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
|
/openbsd-src/regress/usr.bin/ssh/ |
H A D | hostbased.sh | 51 for algo in $algos; do 52 trace "hostbased algo $algo" 54 if [ "x$algo" != "xdefault" ]; then 55 opts="$opts -oHostbasedAcceptedAlgorithms=$algo" 59 fail "connect failed, hostbased algo $algo" 61 fail "hostbased algo $algo bad SSH_CONNECTION" \ 64 verbose "ok hostbased algo $algo"
|
/openbsd-src/sys/dev/pci/drm/i915/display/ |
H A D | intel_gmbus.c | 438 struct i2c_algo_bit_data *algo; in intel_gpio_setup() local 440 algo = &bus->bit_algo; in intel_gpio_setup() 443 bus->adapter.algo_data = algo; in intel_gpio_setup() 445 algo->setsda = set_data; in intel_gpio_setup() 446 algo->setscl = set_clock; in intel_gpio_setup() 447 algo->getsda = get_data; in intel_gpio_setup() 448 algo->getscl = get_clock; in intel_gpio_setup() 449 algo->pre_xfer = intel_gpio_pre_xfer; in intel_gpio_setup() 450 algo->post_xfer = intel_gpio_post_xfer; in intel_gpio_setup() 451 algo->udelay = I2C_RISEFALL_TIME; in intel_gpio_setup() [all …]
|
/openbsd-src/usr.bin/skey/ |
H A D | skey.c | 43 char buf[33], *seed, *slash, *algo; in main() local 51 algo = __progname + 4; in main() 52 if (skey_set_algorithm(algo) == NULL) in main() 53 errx(1, "Unknown hash algorithm %s", algo); in main()
|
/openbsd-src/usr.sbin/unbound/sldns/ |
H A D | keyraw.c | 560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) in sldns_ecdsa2pkey_raw() argument 571 if(algo == LDNS_ECDSAP256SHA256) { in sldns_ecdsa2pkey_raw() 574 } else if(algo == LDNS_ECDSAP384SHA384) { in sldns_ecdsa2pkey_raw() 623 if(algo == LDNS_ECDSAP256SHA256) { in sldns_ecdsa2pkey_raw() 626 } else if(algo == LDNS_ECDSAP384SHA384) { in sldns_ecdsa2pkey_raw()
|
H A D | keyraw.h | 95 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
|
/openbsd-src/sbin/unwind/libunbound/sldns/ |
H A D | keyraw.c | 560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) in sldns_ecdsa2pkey_raw() argument 571 if(algo == LDNS_ECDSAP256SHA256) { in sldns_ecdsa2pkey_raw() 574 } else if(algo == LDNS_ECDSAP384SHA384) { in sldns_ecdsa2pkey_raw() 623 if(algo == LDNS_ECDSAP256SHA256) { in sldns_ecdsa2pkey_raw() 626 } else if(algo == LDNS_ECDSAP384SHA384) { in sldns_ecdsa2pkey_raw()
|
H A D | keyraw.h | 95 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
|
/openbsd-src/usr.sbin/unbound/testcode/ |
H A D | unitverify.c | 165 uint8_t algo = (uint8_t)dnskey_get_algo(dnskey, i); in setup_sigalg() local 166 if(a[algo] == 0) { in setup_sigalg() 167 a[algo] = 1; in setup_sigalg() 168 sigalg[n++] = algo; in setup_sigalg() 420 /** Test hash algo - NSEC3 hash it and compare result */ in nsec3_hash_test_entry() 464 /** Read file to test NSEC3 hash algo */ in nsec3_hash_test()
|
/openbsd-src/sys/dev/pci/drm/include/linux/ |
H A D | i2c.h | 65 const struct i2c_algorithm *algo; member
|
/openbsd-src/usr.bin/signify/ |
H A D | signify.c | 597 char algo[32]; member 635 if (strcmp(c->algo, "SHA256") == 0) { in verifychecksum() 639 } else if (strcmp(c->algo, "SHA512") == 0) { in verifychecksum() 644 errx(1, "can't handle algorithm %s", c->algo); in verifychecksum() 682 c.algo, c.file, c.hash); in verifychecksums()
|